{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T17:55:45Z","timestamp":1743098145260,"version":"3.40.3"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319302218"},{"type":"electronic","value":"9783319302225"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-30222-5_6","type":"book-chapter","created":{"date-parts":[[2016,3,1]],"date-time":"2016-03-01T03:45:11Z","timestamp":1456803911000},"page":"124-136","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Understanding the Use of Location Sharing Services on Social Networking Platforms in China"],"prefix":"10.1007","author":[{"given":"Shang","family":"Gao","sequence":"first","affiliation":[]},{"given":"Xuemei","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,1]]},"reference":[{"issue":"2","key":"6_CR1","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1016\/0749-5978(91)90020-T","volume":"50","author":"I Ajzen","year":"1991","unstructured":"Ajzen, I.: The theory of planned behavior. Organ. Behav. Hum. Decis. Process. 50(2), 179\u2013211 (1991)","journal-title":"Organ. Behav. Hum. Decis. Process."},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Barth, A., Datta, A., Mitchell, J.C., et al.: Privacy and contextual integrity: framework and applications. In: 2006 IEEE Symposium on Security and Privacy, 15 pp. 184\u2013198. IEEE (2006)","DOI":"10.1109\/SP.2006.32"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Cramer, H., Rost, M., Holmquist, L.E.: Performing a check-in: emerging practices, norms and \u2018conflicts\u2019 in location-sharing using foursquare. In: Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services, pp. 57\u201366. ACM (2011)","DOI":"10.1145\/2037373.2037384"},{"issue":"3","key":"6_CR4","doi-asserted-by":"publisher","first-page":"319","DOI":"10.2307\/249008","volume":"13","author":"FD Davis","year":"1989","unstructured":"Davis, F.D.: Perceived usefulness, perceived ease of use and user acceptance of information technology. MIS Q. 13(3), 319\u2013340 (1989)","journal-title":"MIS Q."},{"issue":"1","key":"6_CR5","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1287\/isre.3.1.60","volume":"3","author":"W DeLone","year":"1992","unstructured":"DeLone, W., McLean, E.: Information systems success: the quest for the dependent variable. Inf. Syst. Res. 3(1), 60\u201395 (1992)","journal-title":"Inf. Syst. Res."},{"key":"6_CR6","volume-title":"Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research","author":"M Fishbein","year":"1975","unstructured":"Fishbein, M., Ajzen, I.: Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research. Addison-Wesley, Reading (1975)"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Gao, S., Krogstie, J.: Understanding business models of mobile ecosystems in China: a case study. In: The Proceedings of the 7th International Conference on Management of Computational and Collective IntElligence in Digital EcoSystems (MEDES 2015). ACM (2015)","DOI":"10.1145\/2857218.2857229"},{"issue":"2","key":"6_CR8","first-page":"147","volume":"10","author":"S Gao","year":"2014","unstructured":"Gao, S., Krogstie, J., Siau, K.: Adoption of mobile information services: an empirical study. Mob. Inf. Syst. 10(2), 147\u2013171 (2014)","journal-title":"Mob. Inf. Syst."},{"issue":"1","key":"6_CR9","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1108\/IJILT-08-2014-0017","volume":"32","author":"S Gao","year":"2015","unstructured":"Gao, S., Krogstie, J., Thingstad, T., et al.: A mobile service using anonymous location-based data: finding reading rooms. Int. J. Inf. Learn. Technol. 32(1), 32\u201344 (2015)","journal-title":"Int. J. Inf. Learn. Technol."},{"key":"6_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1007\/978-3-319-20892-3_44","volume-title":"Human Aspects of IT for the Aged Population. Design for Aging","author":"S Gao","year":"2015","unstructured":"Gao, S., Krogstie, J., Yang, Y.: Differences in the adoption of smartphones between middle aged adults and older adults in China. In: Zhou, J., Salvendy, G. (eds.) ITAP 2015. LNCS, vol. 9193, pp. 451\u2013462. Springer, Heidelberg (2015)"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Gao, S., Roinend, P.C., Krogstie, J.: The adoption of mobile tourism services: an empirical study. In: The Proceedings of the 10th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2012), pp. 47\u201356. ACM (2012)","DOI":"10.1145\/2428955.2428972"},{"issue":"3","key":"6_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/joeuc.2003070101","volume":"15","author":"D Gefen","year":"2003","unstructured":"Gefen, D.: TAM or just plain habit: a look at experienced online shoppers. J. End User Comput. 15(3), 1\u201313 (2003)","journal-title":"J. End User Comput."},{"key":"6_CR13","unstructured":"Grodzinsky, F., Tavani, H.T.: Applying the \u201ccontextual integrity\u201d model of privacy to personal blogs in the blogoshere (2010)"},{"key":"6_CR14","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1080\/02683960110102407","volume":"16","author":"RP Horton","year":"2001","unstructured":"Horton, R.P., Buck, T., Waterson, P.E., et al.: Explaining intranet use with the technology acceptance model. J. Inf. Technol. 16, 237\u2013249 (2001)","journal-title":"J. Inf. Technol."},{"issue":"4","key":"6_CR15","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1057\/ejis.2008.29","volume":"17","author":"IA Junglas","year":"2008","unstructured":"Junglas, I.A., Johnson, N.A., Spitzm\u00fcller, C.: Personality traits and concern for privacy: an empirical study in the context of location-based services. Eur. J. Inf. Syst. 17(4), 387\u2013402 (2008)","journal-title":"Eur. J. Inf. Syst."},{"key":"6_CR16","doi-asserted-by":"crossref","unstructured":"Kostakos, V., Venkatanathan, J., Reynolds, B., et al.: Who\u2019s your best friend?: targeted privacy attacks In location-sharing social networks. In: Proceedings of the 13th International Conference on Ubiquitous Computing, pp. 177\u2013186. ACM (2011)","DOI":"10.1145\/2030112.2030138"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Li, M., Zhu, H., Gao, Z., et al.: All your location are belong to us: breaking mobile social networks for automated user location tracking. In: Proceedings of the 15th ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 43\u201352. ACM (2014)","DOI":"10.1145\/2632951.2632953"},{"issue":"4","key":"6_CR18","doi-asserted-by":"publisher","first-page":"697","DOI":"10.1007\/s00779-012-0610-6","volume":"17","author":"J Lin","year":"2013","unstructured":"Lin, J., Benisch, M., Sadeh, N., et al.: A comparative study of location-sharing privacy preferences in the United States and China. Pers. Ubiquit. Comput. 17(4), 697\u2013711 (2013)","journal-title":"Pers. Ubiquit. Comput."},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Lindqvist, J., Cranshaw, J., Wiese, J., et al.: I\u2019m the mayor of my house: examining why people use foursquare-a social-driven location sharing application. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 2409\u20132418. ACM (2011)","DOI":"10.1145\/1978942.1979295"},{"key":"6_CR20","doi-asserted-by":"crossref","unstructured":"Lipford, H.R., Hull, G., Latulipe, C., et al.: Visible flows: contextual integrity and the design of privacy mechanisms on social network sites. In: International Conference on Computational Science and Engineering 2009, (CSE 2009), pp. 985\u2013989. IEEE (2009)","DOI":"10.1109\/CSE.2009.241"},{"issue":"1","key":"6_CR21","first-page":"101","volume":"79","author":"H Nissenbaum","year":"2004","unstructured":"Nissenbaum, H.: Privacy as contextual integrity. Wash. Law Rev. 79(1), 101\u2013139 (2004)","journal-title":"Wash. Law Rev."},{"issue":"3","key":"6_CR22","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1080\/10864415.2003.11044275","volume":"7","author":"PA Pavlou","year":"2003","unstructured":"Pavlou, P.A.: Consumer acceptance of electronic commerce: integrating trust and risk with the technology acceptance model. Int. J. Electron. Commerce. 7(3), 101\u2013134 (2003)","journal-title":"Int. J. Electron. Commerce."},{"key":"6_CR23","volume-title":"The Diffusion of Innovations","author":"EM Rogers","year":"1995","unstructured":"Rogers, E.M.: The Diffusion of Innovations. Free Press, New York (1995)"},{"key":"6_CR24","doi-asserted-by":"crossref","unstructured":"Shi, P., Xu, H., Chen, Y.: Using contextual integrity to examine interpersonal information boundary on social network sites. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 35\u201338. ACM (2013)","DOI":"10.1145\/2470654.2470660"},{"key":"6_CR25","first-page":"119","volume":"6","author":"JY Tsai","year":"2010","unstructured":"Tsai, J.Y., Kelley, P.G., Cranor, L.F., et al.: Location-sharing technologies: privacy risks and controls. ISJLP 6, 119 (2010)","journal-title":"ISJLP"},{"issue":"3","key":"6_CR26","doi-asserted-by":"crossref","first-page":"425","DOI":"10.2307\/30036540","volume":"27","author":"V Venkatesh","year":"2003","unstructured":"Venkatesh, V., Morris, M.G., Davis, G.B., et al.: User acceptance of information technology: toward a unified view. MIS Q. 27(3), 425\u2013478 (2003)","journal-title":"MIS Q."},{"issue":"2\u20133","key":"6_CR27","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/s12525-009-0012-4","volume":"19","author":"H Xu","year":"2009","unstructured":"Xu, H., Gupta, S.: The effects of privacy concerns and personal innovativeness on potential and experienced customers\u2019 adoption of location-based services. Electron. Markets 19(2\u20133), 137\u2013149 (2009)","journal-title":"Electron. Markets"},{"issue":"2","key":"6_CR28","first-page":"135","volume":"13","author":"T Zhou","year":"2012","unstructured":"Zhou, T.: Examining location-based services usage from the perspectives of unified theory of acceptance and use of technology and privacy risk. J. Electron. Commer. Res. 13(2), 135\u2013144 (2012)","journal-title":"J. Electron. Commer. Res."},{"key":"6_CR29","doi-asserted-by":"crossref","unstructured":"Zhu, C., Wat, K.K., Fang, B., et al.: Privacy and social effects in location sharing services. In: 2012 IEEE First International Conference on Services Economics (SE), pp. 62\u201365. IEEE (2012)","DOI":"10.1109\/SE.2012.9"},{"key":"6_CR30","first-page":"109","volume":"3","author":"M Zimmer","year":"2008","unstructured":"Zimmer, M.: Privacy on planet Google: using the theory of contextual integrity to clarify the privacy threats of Google\u2019s quest for the perfect search engine. J. Bus. Tech. L. 3, 109 (2008)","journal-title":"J. Bus. Tech. L."}],"container-title":["Communications in Computer and Information Science","E-Business and Telecommunications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-30222-5_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T12:20:06Z","timestamp":1559391606000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-30222-5_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319302218","9783319302225"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-30222-5_6","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"1 March 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}